The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.15 does not properly sanitize and escape a parameter before using it in an SQL statement, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34294 | The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.15 does not properly sanitize and escape a parameter before using it in an SQL statement, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Oct 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-10-10T19:37:32.883Z
Reserved: 2023-05-22T21:22:19.282Z
Link: CVE-2023-2843
Updated: 2024-08-02T06:33:05.523Z
Status : Modified
Published: 2023-08-07T15:15:10.977
Modified: 2024-11-21T07:59:24.017
Link: CVE-2023-2843
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.
EUVD